CN106612176B - One kind being based on quantum true random number arranging key negotiating system and machinery of consultation - Google Patents

One kind being based on quantum true random number arranging key negotiating system and machinery of consultation Download PDF

Info

Publication number
CN106612176B
CN106612176B CN201611164195.9A CN201611164195A CN106612176B CN 106612176 B CN106612176 B CN 106612176B CN 201611164195 A CN201611164195 A CN 201611164195A CN 106612176 B CN106612176 B CN 106612176B
Authority
CN
China
Prior art keywords
random number
key
message
number sequence
true random
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201611164195.9A
Other languages
Chinese (zh)
Other versions
CN106612176A (en
Inventor
李大双
徐兵杰
樊矾
何远杭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CETC 30 Research Institute
Original Assignee
CETC 30 Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CETC 30 Research Institute filed Critical CETC 30 Research Institute
Priority to CN201611164195.9A priority Critical patent/CN106612176B/en
Publication of CN106612176A publication Critical patent/CN106612176A/en
Application granted granted Critical
Publication of CN106612176B publication Critical patent/CN106612176B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention provides one kind to be based on quantum true random number arranging key system and machinery of consultation, and controlled pseudo-random number sequence generator and quantum true random number sequence generator based on both link ends, agreement intercourses one group of quantum true random number sequence through consultation;By the exchanged next quantum true random number sequence in opposite end after cryptographic Hash operation, that group of quantum true random number sequence for being used to exchange with local terminal compares every end link, obtains identical bit value position marker information;One group of pseudo-random number sequence is read, according to the position marker information, takes out the bit value of corresponding position one by one, constitutes key original material bit string, by Hash operation, obtains shared key.Compared with prior art, the channel eavesdropping attack channel of opponent can thoroughly be eliminated, and it does not transmit any information relevant to key original material in cipher key agreement process, makes opponent that can not eavesdrop or decode means based on channel and obtain any any information related with generated shared key.

Description

One kind being based on quantum true random number arranging key negotiating system and machinery of consultation
Technical field
The present invention relates to one kind to be based on quantum true random number arranging key negotiating system and machinery of consultation, more particularly to one Kind is directed to unsafe wired and wireless network environment, is based on quantum true random number arranging key negotiating system and machinery of consultation.
Background technique
It is the key point of secret communication that key is shared, and the secure communication between two legitimate users is based on only communicating double The privacy key known just now, it is that design is close that how legal communicating pair could share a group key safely, in real time Code system must solve the problems, such as.
Classical cryptoraphy establishes the safety that key is distributed on difficult math question and the complexity for cracking calculating, key The key information of interaction transmitting is implemented to protect by high strength encrypting algorithm in negotiations process, but this can not ensure that it is absolute Safety, the reason is that the continuous enhancing of the performance with computer, especially when the quantum calculation with ultrafast computing capability When machine enters practical application, the safety of the cryptographic key distribution method based on classical cryptoraphy will necessarily be seriously threatened.Therefore, Network security applies the demand to developing and designing the cryptographic key distribution method with high security very urgent.
Although quantum key distribution (QKD) method based on the physical securitys characteristic such as indeterminacy, unclonable is theoretically With absolute safety, but it can not also solve the cipher key distribution problem of wireless application Yu wide area network remote link.
In addition, the method for taking artificial key distribution, although key information can also be made to avoid stealing attack by channel, Its key be substantially it is fixed, hardly have the ability of dynamic change, flexibility is very poor, and preset key group number by It is limited to memory capacity.Moreover, the wind that if also there is the limited fixed key of cryptographic system long-time service group number key to be cracked Danger.In addition, also there is the high risk artificially divulged a secret in the frequent replacement process of artificial key.
Summary of the invention
The technical problem to be solved in the present invention is to provide one kind can be used on unsafe wireless and wire link, has High security based on quantum true random number arranging key negotiating system and machinery of consultation.
The technical solution adopted by the invention is as follows: a kind of be based on quantum true random number arranging key negotiating system, feature Be: both link ends, every end respectively include the controlled pseudo-random number sequence generator being respectively connected with key agreement control module, Quantum true random number sequence generator and Hash operation module;It is truly random that the quantum true random number sequence generator generates quantum Number Sequence code stream provides true random number data block for cipher key agreement process;The controlled pseudo-random number sequence generator generates pseudo- Random number sequence code stream provides the pseudo-random number sequence data block of needs for cipher key agreement process;The key agreement controls mould Block realizes key agreement protocol, the i.e. negotiations process of the shared key of both link ends.
The present invention is based on the controlled pseudo-random number sequence generators of both link ends and respective independently operated uncontrolled amount Sub- true random number sequence generator.
Further include digital signature computing module, digital signature calculation function is provided.
The quantum true random number sequence generator is the true random number sequence generator based on light quantum noise, is based on light The truly random characteristic of quantum noise generates quantum true random number sequence code stream.
Cryptographic key negotiation method based on above-mentioned quantum true random number arranging key dissemination system are as follows: both link ends are through consultation Agreement intercourses the irrelevant quantum true random number sequence of one group of equal length;Every end link quantum that opposite end is exchanged After cryptographic Hash operation, that group of quantum true random number sequence for being used to exchange with local terminal compares true random number sequence, right The identical position bit of the identical position bit bit value is marked, and obtains identical bit value position marker information;Read one group of puppet with Machine Number Sequence;According to the identical bit value position marker information, taken out one by one from one group of pseudo-random number sequence of reading corresponding The bit value of position constitutes a key original material bit string;The original material bit string of acquisition is transported by another Hash It calculates, obtains the shared key finally needed.
Since in cipher key agreement process, both link ends do not exchange the primary data information (pdi) for constructing key, therefore steal Hearer can not get any information about the key distributed.Thus it is ensured that the high security of key distribution.
The method also includes key agreement protocol has used key negotiation request, key negotiation response and key association Quotient confirms the message of 3 kinds of different-formats;The message of 3 kinds of different-formats includes key negotiation information type and key negotiation information Serial number;Key negotiation information type is for distinguishing three kinds of message: request message, response message and confirmation message;Key agreement disappears Breath serial number is for distinguishing different key agreement events;Key negotiation request message further includes pseudorandom number generator initial parameter Number, pseudorandom number generator algorithm parameter number, pseudo random number code stream read initial position and quantum true random number;Key association Quotient's response message further includes quantum true random number.The sequence number that key negotiation information contains provides anti-playback attack capability.
The message of 3 kinds of different-formats further includes message protection cryptographic Hash, be each message in will protection Hash codomain it The message protection Hash codomain content that Hash operation obtains is carried out after preceding one data block of codomain Composition of contents.
The message of 3 kinds of different-formats further includes message cryptographic Hash digital signature, for transmitting the number label of Hash codomain Name is to ensure the authenticity of message.
Message protection Hash codomain and message cryptographic Hash digital signature domain are provided commonly for preventing for cipher key agreement process Message personation and Tampering attack, provide ID authentication mechanism, improve the safety of cipher key agreement process.
Cipher key agreement process needs to send and receive key negotiation request, key negotiation response and key agreement confirmation 3 Message.Cipher key agreement process is implemented before the transmission of this 3 message with the processing after reception.
The cryptographic key negotiation method further includes, and when carrying out key negotiation request, key negotiation request message is saved one Message copy, if not receiving key negotiation response message in setting time threshold range, according to the message pair of preservation This retransmission key negotiation request message.
Compared with prior art, the beneficial effects of the present invention are: the channel eavesdropping attack channel of opponent can be eliminated thoroughly, And it does not transmit any information relevant to key original material in cipher key agreement process, eavesdrop opponent can not based on channel Or it decodes means and obtains any any information related with generated shared key.
Detailed description of the invention
Fig. 1 is the key distribution system structural block diagram of a wherein embodiment of the invention.
Fig. 2 is the key negotiation request message format schematic diagram of a wherein embodiment of the invention.
Fig. 3 is the key negotiation response message format schematic diagram of a wherein embodiment of the invention.
Fig. 4 is the key agreement confirmation message form schematic diagram of a wherein embodiment of the invention.
Fig. 5 is the key agreement flow diagram of a wherein embodiment of the invention.
Fig. 6 actively initiates key agreement flow diagram for a wherein embodiment of the invention.
Fig. 7 is the key negotiation response control and processing flow schematic diagram of a wherein embodiment of the invention.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right The present invention is further elaborated.It should be appreciated that described herein, specific examples are only used to explain the present invention, not For limiting the present invention.
Any feature disclosed in this specification (including abstract and attached drawing) unless specifically stated can be equivalent by other Or the alternative features with similar purpose are replaced.That is, unless specifically stated, each feature is a series of equivalent or class Like an example in feature.
Specific embodiment 1
As shown in Figure 1, a kind of be based on quantum true random number arranging key negotiating system, both link ends, every end is respectively included Controlled pseudo-random number sequence generator, quantum true random number sequence generator and the Kazakhstan being respectively connected with key agreement control module Uncommon computing module;The quantum true random number sequence generator generates quantum true random number sequence code stream, is cipher key agreement process True random number data block is provided;The controlled pseudo-random number sequence generator generates pseudo-random number sequence code stream, is key agreement Process provides the pseudo-random number sequence data block needed;The key agreement control module realizes key agreement protocol, i.e. link The negotiations process of the shared key at both ends.
Specific embodiment 2
On the basis of specific embodiment 1, further includes digital signature computing module, digital signature calculation function is provided.
Specific embodiment 3
On the basis of specific embodiment 1 or 2, the quantum true random number sequence generator is based on light quantum noise True random number sequence generator, the truly random characteristic based on light quantum noise generate quantum true random number sequence code stream.
Specific embodiment 4
On the basis of one of specific embodiment 1 to 3, the key association based on quantum true random number arranging key dissemination system Quotient's method are as follows: agreement intercourses the irrelevant quantum true random number sequence of one group of equal length to both link ends through consultation;Often Hold link by the exchanged next quantum true random number sequence in opposite end after cryptographic Hash operation, that group amount for being used to exchange with local terminal Sub- true random number sequence compares, and is marked to the identical position bit of the identical position bit bit value, obtains identical bit value Position marker information;Read one group of pseudo-random number sequence;According to the identical bit value position marker information, from one group of reading The bit value for taking out corresponding position in pseudo-random number sequence one by one constitutes a key original material bit string;By the original of acquisition Material bit string passes through another Hash operation, obtains the shared key finally needed.
Since in cipher key agreement process, both link ends do not exchange the primary data information (pdi) for constructing key, therefore steal Hearer can not get any information about the key distributed.Thus it is ensured that the high security of key distribution.
Specific embodiment 5
On the basis of specific embodiment 4, as shown in Fig. 2 to Fig. 4, the method also includes key agreement protocol is used Key negotiation request, key negotiation response and key agreement confirm the message of 3 kinds of different-formats;3 kinds of different-formats disappear Breath includes key negotiation information type and key negotiation information serial number;Key negotiation information type is for distinguishing three kinds of message: Request message, response message and confirmation message;Key negotiation information serial number is for distinguishing different key agreement events;Key association Quotient's request message further includes pseudorandom number generator initial parameter number, pseudorandom number generator algorithm parameter number, pseudorandom Bitstream reads initial position and quantum true random number;Key negotiation response message further includes quantum true random number.Key agreement The sequence number that message contains provides anti-playback attack capability.
Specific embodiment 6
On the basis of specific embodiment 5, the message of 3 kinds of different-formats further includes message protection cryptographic Hash, is each The message protection for obtaining progress Hash operation after one data block of codomain Composition of contents before protection Hash codomain in message Hash codomain content.
Specific embodiment 7
On the basis of specific embodiment 6, the message of 3 kinds of different-formats further includes message cryptographic Hash digital signature, is used Ensure the authenticity of message in the digital signature of transmission Hash codomain.
Cipher key agreement process needs to send and receive key negotiation request, key negotiation response and key agreement confirmation 3 Message.Cipher key agreement process is implemented before the transmission of this 3 message with the processing after reception.
Specific embodiment 8
On the basis of one of specific embodiment 4 to 7, the cryptographic key negotiation method further includes carrying out key negotiation request When, key negotiation request message is saved into a message copy, if not receiving key association in setting time threshold range Quotient's response message then retransmits key negotiation request message according to the message copy of preservation.
The quantum true random number storage pool that there is the quantum real random number generator capacity to be not less than 16K byte, Generated quantum true random number sequence is continually written into the way of address cycle into the quantum true random number storage pool, Key agreement control module connects according to the address in the quantum true random number storage pool that needs to read at any time of cipher key agreement process One piece of continuous true random number sequence.
The quantum true random number sequence generator continues independent operating after powering on, and carries out state modulator without external.It is right The operation that lacks only of quantum true random number storage pool is also based on continuous address cycle progress.
The controlled pseudo-random number sequence generator, before operation each time, key agreement protocol control module will Its initial parameter, pseudo-random sequence generation algorithm parameter and operation times parameter is arranged, and (the operation times parameter is for determining The initial time of write-in pseudo random number storage pool) setting control, record and temporary generated pseudo-random number sequence code stream.It is described The pseudo random number storage pool that there is controlled pseudo-random number sequence generator a capacity to be not less than 16K byte, key agreement control Module needs to start the controlled pseudo-random number sequence generator operation according to key agreement Row control, and being read out need to The pseudo-random number sequence data block wanted.
The Hash operation module realizes that the universe Hash operation of equal length output and regular length export both of which The Hash operation function of totally 3 hash functions (hash_f1, hash_f2 and hash_f3), according to key agreement control module Order executes Hash operation, receives the write-in of its source data and controls with the operation that Hash operation result data is read.
The key agreement control module realizes key agreement protocol, the i.e. negotiations process of the shared key of both link ends; Its function includes: to read quantum true random sequence bit stream data;Key negotiation information is generated to be handled with transmission;Key agreement protocol Message sink processing;Initial parameter, the pseudo-random sequence of pseudo-random number sequence generator generate algorithm parameter, pseudo random sequence code The algorithm that the setting and pseudo-random code stream for flowing operation times and reading position generate, which starts, to be controlled;Reading is opened from designated position The pseudo-random sequence bit stream data block of beginning;Hash operation functional operation control;Same bit position marks operation;The original material of key Expect the construction of bit string;The determination of shared key.
On wire link, cipher key agreement process generally all only needs to be exchanged with each other key negotiation information of transmission.And On wireless links, it is understood that there may be because the case where transmission failure occurs in channel error code, then need to retransmit key based on timeout mechanism Negotiation message.In the present patent application, as shown in Fig. 2 to Fig. 4, key agreement protocol has used key negotiation request, key association Quotient's response and key agreement confirm the message of 3 kinds of different-formats.
The message of 3 kinds of different-formats includes key negotiation information type and key negotiation information serial number.Key agreement disappears Cease type (3bit) for distinguishing three kinds of message: 01 represents request message, and 02 represents response message, and 03 represents confirmation message.It is close Key negotiation message serial number (29bit) is for distinguishing different key agreement events.
Key negotiation request message further includes pseudorandom number generator initial parameter number (16bit), pseudo random number generation Device algorithm parameter numbers (16bit), pseudo random number code stream reads initial position (256Byte) and quantum true random number;Key association Quotient's response message further includes quantum true random number.
The message of 3 kinds of different-formats further includes message protection cryptographic Hash and message cryptographic Hash digital signature;Message protection Hash codomain (256bit) is used to transmit Hash (hash_f1) calculated value of those codomains before the domain, data signature domain (256Byte) is used to transmit the digital signature of Hash codomain to ensure the authenticity of message, the two message fields are provided commonly for preventing Only for the message personation of cipher key agreement process and Tampering attack, ID authentication mechanism is provided, cipher key agreement process is improved Safety.
Cipher key agreement process needs to send and receive key negotiation request, key negotiation response and key agreement confirmation 3 Message.Cipher key agreement process is implemented before the transmission of this 3 message with the processing after reception.
Specific embodiment 9
Key agreement initiates control and process flow are as follows:
When key agreement control processing module receives the key distribution command from cryptographic system, actively initiation includes Share the key agreement control and process flow of 22 steps.
As shown in figure 5, it is as described below actively to initiate key agreement detailed process:
Step S101: initialization sends to each module and resets control command, pseudo random number pond reset, into initial shape State;
Step S102: waiting the key of cryptographic system to be received to distribute instruction, if the key distribution for receiving cryptographic system refers to Show, then enters cipher key agreement process;
Step S103: it randomly selects the initial parameter number of pseudorandom number generator, algorithm parameter number, read start bit Parameter (for determining the initial time in write-in pseudo random number pond) is set, a pseudo random number is constructed and generates order, by internal total Line passes to controlled pseudo-random number sequence generator, and starting pseudo random number generates process, generated to open from initial position parameter The pseudo random number code stream at moment beginning is filled up in the pseudo random number pond being filled into the module automatically until by its pool of keys Until (16KByte);
Step S104: the quantum true random number data block for 256 byte longs that local terminal generates is read from true random number pond, is filled out It is charged in the quantum true random number codomain in key negotiation request message, and a copy for saving the true random number data block is standby With;
Step S105: key negotiation information types value, key negotiation information sequence number value, the initial parameter randomly selected are compiled Number, algorithm parameter number, read starting (moment) location parameter, be filled into the corresponding codomain in key negotiation request message. By 6 codomain Composition of contents, one data block entirety before key negotiation request message, controls Hash operation module and carry out Hash Obtained 256bit result is filled into message protection Hash codomain by operation (hash_f1).It is calculated using a kind of asymmetric public key Method, for message protection Hash codomain, the public key based on the link opposite end that preparatory manual allocation obtains is digitally signed encryption Obtained signature value is filled into message cryptographic Hash digital signature codomain by operation;Key negotiation request message is encapsulated into one In standard IP packet, a message copy is saved, and negotiation request message is transmitted to link opposite end;Then start one to disappear Request repeat timer T1 is ceased, and sets maximum allowable number of retransmissions upper limit value for a retransmission counter N1;
Step S106: judge whether to receive effective negotiation response message;If being not received by effective negotiation response Message goes to step S107;Otherwise step S111 is gone to;
Step S107: judge whether timer T1 is overtime;If so, going to step S108;Step S107 is gone to if not;
Step S108: judgement (N1-1) whether 0;If so, going to step S109 executes repeating transmission;If it is not, going to step S110 distributes to System Reports to fail;
Retransmission counter value is subtracted 1, and retransmit negotiation request message copy, goes to step by step S109: resetting timer T1 Rapid S106;
Step S110: distribute failure result to System Reports;Go to step S121;
Step S111: judge whether the negotiation response message received for the first time according to message sequence number;If so, going to step S112;If it is not, going to step S118 execution;
Step S112: the content of 2 codomains in front in response message is copied to confirmation by one negotiation confirmation message of construction In the correspondence codomain of message, message protection Hash operation (hash_f1) and cryptographic Hash signature operation are carried out, operation result is filled Into the correspondence codomain of confirmation message, key agreement confirmation message is sent back to link opposite end;Start confirmation message and retransmits time-out Timer T2, setting confirmation message retransmit calculator N2;
Step S113: 256 bytes (2048bit) true random number that both link ends exchange is divided into 4 continuous 64 words Locking nub obtains after being directed to the universe Hash operation (hash_f2 enhances safety) that each 64 block of bytes carries out isometric output respectively 4 64 bytes cryptographic Hash, then bit carries out the comparison of same position corresponding bit value one by one, obtain identical bit (" 0 " or " 1 ") value position marker information;In the random number for the 2048bit that two are completely independent generation, averagely there is phase with 1024 With the position of bit value;Whether carry out divide and how to be divided, according to the actual situation depending on;
Step S114: the byte length filled in pseudo random number pond is waited to reach the mathematical algorithm length that operation requires always Lower limit goes to the processing of next step when having had been written into the pseudo-random number sequence data of at least 256 bytes;
Step S115: then reading the pseudo random number data block of continuous 256 byte long of beginning from pseudo random number pond, enters The processing of next step;For the pseudo random number data block of 256 byte longs, it is based on identical bit value position marker information, from puppet Those of corresponding position number bit (" 0 " or " 1 ") value is taken out in random number data block one by one, constitutes a key original material Bit string completes the acquisition operation of a round key original material;If epicycle operates the total of key original material bit string obtained Length has reached defined minimum length value requirement, then goes to step S116;If the sum of these same bits values obtained The requirement of minimum length value as defined in not reaching, then obtain back to back next piece of 256 byte longs from controlled pseudo random number pond Pseudo-random sequence data, recorded again according to identical quantum random number bit value position mark, continue obtaining more multi-key cipher The operation of original material bit string, by the bit of acquisition string result and previously obtained bit go here and there result concatenate to be formed one it is longer Key original material bit string, until obtaining required minimum length;
Step S116: 2 data block block difference are divided into key original material bit obtained string (1024bit long) It carries out Hash operation (hash_f3), the cryptographic Hash of 2 64 bytes (512bit) is obtained, by the cryptographic Hash string of the two 512bit It is connected together, obtains the shared key of the 1024bit length finally needed;Whether carry out dividing and how being divided, Depending on according to the actual situation;
The shared key that distribution obtains is negotiated in the report of S117: Xiang Benduan cryptographic system of step;
Step S118: T2 time-out is waited;If T2 is overtime, the processing of next step is gone to.If T2 has not timed out, continue waiting for;
Step S119: if (N2-1) > 0, the processing of next step is gone to;Otherwise, step S121 is gone to;
Step S120: confirmation message is retransmitted, restarts T2, N2 value subtracts 1;Go to step S118;
Step S121: the negotiation message of local terminal is generated into sequence number value circulation plus 1;
Step S122: end operation.
As shown in fig. 6, key negotiation response control and process flow are as follows:
Step S201: initialization sends to each module and resets control command, pseudo random number pool of keys is reset, into first Beginning state;
Step S202: the key negotiation request message of receives link opposite end is waited;Upon receiving a message, by connecing The Hash protection of receipts process is calculated to be calculated with the digital signature of receive process, carries out the Effective judgement of message;If both are counted Calculating in result has any one codomain corresponding with message inconsistent, then message is invalid and without any processing;If this two Kind calculated result codomain all corresponding with message is completely the same, then is effective message;If not receiving effective negotiation request to disappear Breath, then continue waiting for.If receiving effective negotiation request message, goes to next processing step and execute;
Step S203: according to the reception message for the message sequence number and local terminal for including in the key negotiation request message received Serial number record, judge whether to receive for the first time corresponding with the message sequence number requests;If not received negotiation request for the first time Message sequence number then goes to step S207;If receiving for the first time, the quantum true random number data block saved in request message is spare, Current key negotiation information sequence number is recorded, next processing step is gone to and goes to execute;
Step S204: initial parameter number, the algorithm parameter number, pseudo random number initial position in the request message are taken out Parameter constructs a pseudo random number and generates order, passes to controlled pseudo-random number sequence generator by internal bus, starting is pseudo- Random number generates process, and the pseudo random number code stream the generated parameter since initial position will be filled into automatically in the module In pseudo random number pond, until pseudo random number pond is filled up;
Step S205: reading continuous 256 byte true random number data block from the true random number pond of local terminal, saves standby With;
Step S206: executing the Hash calculation to both sides' true random number, and same bit position mark information calculates;By link 256 bytes (2048bit) true random number of two ends exchange is divided into 4 continuous 64 block of bytes, is directed to each 64 byte respectively After block carries out Hash operation (hash_f2 enhances safety), the cryptographic Hash of 4 64 bytes is obtained, then bit progress is identical one by one The comparison of position corresponding bit value obtains identical bit (" 0 " or " 1 ") value position mark data;Generation is completely independent at two 2048bit random number in, the positions averagely with 1024 with identical bit value;
Step S207: being filled with response message type value for the value of negotiation message type field, by filling out for negotiation message serial number It fills for value identical with request message serial number, duplication is filled into the corresponding codomain in the key negotiation response message for needing to construct Interior, the true random number filling that local terminal is generated is negotiated in the corresponding codomain in response message;For 3 codomains before response message The Hash that content executes transmission process protects operation, and operation result is filled into Hash protection codomain;It is breathed out for message protection Uncommon codomain executes the digital signature operation of transmission process, and operation result is filled into Hash protection value digital signature domain.It will be close Key is negotiated response message and is encapsulated into a standard IP packet, saves the copy of the negotiation response message, and the negotiation is rung Message is answered to transmit to link opposite end;Then start a message response retransmission timer T3, and by a retransmission counter N3 It is set as maximum allowable number of retransmissions upper limit value;
Step S208: the byte length filled in local terminal pseudo random number pond is waited to reach under the length that operation requires always Limit;Then next step execution is gone to;
Step S209: the pseudo random number data block that continuous 256 byte long of beginning is read out of pseudo random number pond is spare.So After go to next step execution;
Step S210: it executes key original material bit string and obtains operation.For the pseudo random number data block of 256 byte longs, Based on identical bit value position marker information, those of corresponding position number bit (" 0 " is taken out one by one from pseudo random number data block Or " 1 ") value, a key original material bit string is constituted, the acquisition operation of a round key original material is completed;
Step S211: judge that the total length of key original material bit string has reached defined minimum length value requirement;If not Reach the requirement of minimum length value, then goes to step S209 execution, continue to obtain next continuous 256 byte long pseudo-random data Block is recorded according to the mark information of identical bit value position again, continues the behaviour for obtaining more multi-key cipher original material bit string Make, the bit string result of acquisition is concatenated to form a longer key original material bit with previously obtained bit string result String.If having reached defined minimum length value requirement, next step execution is gone to;
Step S212: it executes shared key and calculates;Key original material bit obtained string (1024bit long) is divided Carry out Hash operation (hash_f3) respectively for 2 data block blocks, obtain the cryptographic Hash of 2 64 bytes (512bit), by this two The cryptographic Hash of a 512bit is serially connected, and obtains the shared key of the 1024bit length finally needed;Then it goes to next Step executes;
The shared key that distribution obtains is negotiated in the notice of S213: Xiang Benduan cryptographic system of step;Then next step is gone to It executes;
Step S214: judge whether to receive effective negotiation confirmation message;If so, going to step S219, terminate epicycle Key distribution procedure;If it is not, going to next step execution;
Step S215: T3 time-out is waited;If T3 is overtime, the processing of next step is gone to;If T3 has not timed out, continue waiting for;
Step S216: if (N3-1) > 0, the processing of next step is gone to;Otherwise, step S218 is gone to;
Step S217: it retransmits and negotiates response message copy, restart T3, N3 value subtracts 1;Go to step S214;
Failure result is negotiated in the notice of S218: Xiang Benduan cryptographic system of step;
Step S219: terminate.
In the cryptographic key distribution method that this specific embodiment proposes, the quantum true random number sequence of each direction exchange transmission is long Degree is no less than 1024 bytes, and it is 0.5 that two quantum true random number bit independently generated, which take the average probability of identical value (0 or 1),. Universe Hash operation (enhancing safety) of 256 bytes (2048bit) true random number of both link ends exchange Jing Guo isometric output Afterwards, then one by one bit carries out the comparison of same position corresponding bit value, identical bit position mark data is obtained, then averagely having The identical position mark of 1024 bit values.Then, according to the mark information of these identical bit values, based on it is locally generated it is pseudo- with Machine bit stream data determines the original material information of construction key.Due to negotiations process not transfer key original material information, Thus there is very high safety.
The key agreement mechanisms of this specific embodiment design are needed during realization using these following calculation functions:
The Hash of transmission process protects operation: for the interior value those of before message protection Hash codomain of transmission message The content-control Hash operation module in domain carries out Hash operation (hash_f1), and obtained calculated result is filled into transmission message Protection Hash codomain in;
The Hash of receive process protects operation: those of being located at before Hash codomain in message in codomain for receiving Hold, control Hash operation module carries out Hash operation (hash_f1), by obtained 256bit result and receives message protection Hash Codomain is compared;Show that message is tampered if not identical, is invalid message;
The digital signature operation of transmission process: before sending a negotiation message, for the use pair of message protection Hash codomain The public key at end is digitally signed cryptographic calculation, and obtained calculated result is filled into the message cryptographic Hash number label for sending message In name domain;
The digital signature operation of receive process: it is digitally signed for message protection Hash codomain using the private key of local terminal Operation is decrypted, operation result and the digital signature codomain received in message be not identical if it is signed, which is invalid disappear Breath;
Key negotiation information serial number operation: 3 message sequence numbers being related in each round cipher key agreement process all necessary one It causes;Moreover, every negotiate by a round key, the message sequence number value increment 1 of local terminal;In cipher key agreement process, response message and The serial number of confirmation message all must be consistent with the serial number of request message, is otherwise invalid message;
Identical bit value position marker information obtains operation: the identical two random number bit strings of length is directed to, for each The bit value of same position is successively compared correspondingly, and the bit value of position is identical (being all " 0 " or " 1 " value) if they are the same Then it is labeled as 1;The length of the identical bit value position marker information record obtained is identical with the Bit String to compare as the two; If the bit value of the corresponding position bit is not identical, it is labeled as 0;
Key original material bit goes here and there operation: based on identical bit value position marker information record, for locally generated same Each of the pseudo random number bit string of sample bit length bit, takes out the corresponding position with mark information recording mark for " 1 " value Bit value those of is set, cascade constitutes a new bit string, the original material as key.
Cryptographic key distribution method provided by the invention is based primarily upon pseudorandom number generator, quantum real random number generator, 3 Kind Hash operation and digital signature protection mechanism, by exchanging pseudorandom number generator control parameter, quantum true random number, no The transmission key original material information on unsafe overt channel, has prevented opponent by overt channel and has stolen key information Possibility.The method that joint uses Hash operation and digital signature provides anti-tamper and authenticity for key negotiation information Safety guarantee.The algorithm is mainly used for realizing the key distribution of high security, key on unsafe wirelessly or non-wirelessly chain road The high reliablity of negotiations process.

Claims (8)

1. one kind be based on quantum true random number arranging key negotiating system, it is characterised in that: both link ends, every end respectively include with Controlled pseudo-random number sequence generator, quantum true random number sequence generator and the Hash that key agreement control module is respectively connected with Computing module;The quantum true random number sequence generator generates quantum true random number sequence code stream, mentions for cipher key agreement process For true random number data block;The controlled pseudo-random number sequence generator generates pseudo-random number sequence code stream, is key agreement mistake Journey provides the pseudo-random number sequence data block needed;The key agreement control module realizes key agreement protocol, i.e. link two The negotiations process of the shared key at end;
The negotiations process detailed process of the shared key are as follows: agreement intercourses one group of equal length to both link ends through consultation Irrelevant quantum true random number sequence;Every end link transports the exchanged next quantum true random number sequence in opposite end by cryptographic Hash After calculation, that group of quantum true random number sequence for being used to exchange with local terminal is compared, bit identical to the identical position bit bit value Position is marked, and obtains identical bit value position marker information;Read one group of pseudo-random number sequence;According to the identical bit value Position marker information takes out the bit value of corresponding position one by one from one group of pseudo-random number sequence of reading, constitutes a key original Beginning material bit string;The original material bit string of acquisition is passed through into another Hash operation, obtains the shared key finally needed.
2. key agreement system according to claim 1, it is characterised in that: further include digital signature computing module, provide Digital signature calculation function.
3. key agreement system according to claim 1 or 2, it is characterised in that: the quantum true random number sequence occurs Device is the true random number sequence generator based on light quantum noise, truly random characteristic based on light quantum noise generate quantum very with Machine Number Sequence code stream.
4. based on the cryptographic key negotiation method of quantum true random number arranging key negotiating system described in one of claims 1 to 3, specifically Method are as follows: agreement intercourses the irrelevant quantum true random number sequence of one group of equal length to both link ends through consultation;Every end That group quantum of the link by the exchanged next quantum true random number sequence in opposite end after cryptographic Hash operation, with local terminal for exchanging True random number sequence compares, and is marked to the identical position bit of the identical position bit bit value, obtains identical bit value position Tagging information;Read one group of pseudo-random number sequence;According to the identical bit value position marker information, one group from reading is pseudo- The bit value for taking out corresponding position in random number sequence one by one constitutes a key original material bit string;By the original material of acquisition Expect that bit string passes through another Hash operation, obtains the shared key finally needed.
5. cryptographic key negotiation method according to claim 4, the method also includes key agreement protocol has used key association Consult and request ask, key negotiation response and key agreement confirm 3 kinds of different-formats message;The message of 3 kinds of different-formats includes Key negotiation information type and key negotiation information serial number;Key negotiation information type is for three kinds of message of differentiation: request message, Response message and confirmation message;Key negotiation information serial number is for distinguishing different key agreement events;Key negotiation request disappears Breath further includes pseudorandom number generator initial parameter number, pseudorandom number generator algorithm parameter number, the reading of pseudo random number code stream Take initial position and quantum true random number;Key negotiation response message further includes quantum true random number.
6. cryptographic key negotiation method according to claim 5, the message of 3 kinds of different-formats further includes message protection Hash Value, will to carry out what Hash operation obtained after one data block of codomain Composition of contents before protection Hash codomain in each message Message protection Hash codomain content.
7. cryptographic key negotiation method according to claim 5, the message of 3 kinds of different-formats further includes message cryptographic Hash number Signature, for transmitting the digital signature of Hash codomain to ensure the authenticity of message.
8. the cryptographic key negotiation method according to one of claim 4 to 7, the cryptographic key negotiation method further include, key is carried out When negotiating request, key negotiation request message is saved into a message copy, if do not received in setting time threshold range To key negotiation response message, then key negotiation request message is retransmitted according to the message copy of preservation.
CN201611164195.9A 2016-12-16 2016-12-16 One kind being based on quantum true random number arranging key negotiating system and machinery of consultation Active CN106612176B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611164195.9A CN106612176B (en) 2016-12-16 2016-12-16 One kind being based on quantum true random number arranging key negotiating system and machinery of consultation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611164195.9A CN106612176B (en) 2016-12-16 2016-12-16 One kind being based on quantum true random number arranging key negotiating system and machinery of consultation

Publications (2)

Publication Number Publication Date
CN106612176A CN106612176A (en) 2017-05-03
CN106612176B true CN106612176B (en) 2019-09-24

Family

ID=58636161

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611164195.9A Active CN106612176B (en) 2016-12-16 2016-12-16 One kind being based on quantum true random number arranging key negotiating system and machinery of consultation

Country Status (1)

Country Link
CN (1) CN106612176B (en)

Families Citing this family (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107465508B (en) * 2017-08-07 2021-02-23 吕文华 Method, system and equipment for constructing true random number by combining software and hardware
ES2717548B2 (en) * 2017-11-08 2020-11-26 Univ Vigo Secure key agreement with untrusted devices
CN108510270B (en) * 2018-03-06 2023-03-31 成都零光量子科技有限公司 Mobile transfer method with safe quantum
CN108540250B (en) * 2018-04-23 2020-04-21 佛山市顺德区德雅军民融合创新研究院 Laser pulse-based rapid time synchronization method for satellite-ground quantum key distribution
CN108768632B (en) * 2018-05-29 2021-03-02 如般量子科技有限公司 AKA identity authentication system and method based on symmetric key pool and relay communication
CN108846483B (en) * 2018-06-21 2023-04-14 广西师范大学 Design method of modulo-N subtracter without destroying source operand
CN109299618B (en) * 2018-09-20 2020-06-16 如般量子科技有限公司 Quantum-resistant computing cloud storage method and system based on quantum key card
CN109040132B (en) * 2018-09-26 2021-05-28 南京南瑞继保电气有限公司 Encryption communication method based on random selection of shared secret key
CN111083000B (en) * 2018-10-18 2022-02-18 中国电信股份有限公司 Quantum key distribution method and system, and computer readable storage medium
CN111404674B (en) * 2019-01-02 2023-06-27 中国移动通信有限公司研究院 Method and equipment for generating and receiving session key
CN109728905B (en) * 2019-01-11 2021-04-06 如般量子科技有限公司 Anti-quantum computation MQV key negotiation method and system based on asymmetric key pool
CN109861813B (en) * 2019-01-11 2021-08-10 如般量子科技有限公司 Anti-quantum computing HTTPS communication method and system based on asymmetric key pool
CN109936456B (en) * 2019-01-15 2022-02-11 如般量子科技有限公司 Anti-quantum computation digital signature method and system based on private key pool
CN109687962B (en) * 2019-01-15 2021-04-06 如般量子科技有限公司 Anti-quantum computation MQV key negotiation method and system based on private key pool
CN110011786B (en) * 2019-03-20 2022-03-18 中国电子科技集团公司第三十研究所 High-safety IP secret communication method
CN110086614B (en) * 2019-05-05 2023-03-21 南京邮电大学 Quantum digital signature method using marked single photon source
CN110071943B (en) * 2019-05-28 2021-07-27 中国电子科技集团公司第三十研究所 Compound high-safety IP secret communication method with truly random change of secret key
CN110213257B (en) * 2019-05-28 2021-07-09 中国电子科技集团公司第三十研究所 High-safety IP secret communication method based on true random stream exclusive or encryption
CN110519050B (en) * 2019-08-19 2021-12-17 中国电子科技集团公司第三十研究所 Secret key negotiation method based on quantum true random number exchange and black box mapping
CN113037474B (en) * 2021-03-01 2022-09-23 南京大学 Asymmetric quantum conference key negotiation method and system
CN113473460B (en) * 2021-06-07 2022-07-01 西安电子科技大学 Wireless physical layer key negotiation method based on error correcting code judgment
CN113726507B (en) * 2021-08-26 2023-10-27 新华三信息安全技术有限公司 Data transmission method, system, device and storage medium
CN114124370A (en) * 2021-10-14 2022-03-01 阿里云计算有限公司 Key generation method and device
CN116521775B (en) * 2023-06-28 2023-11-28 天云融创数据科技(北京)有限公司 Method for obtaining quantum random number based on built-in function of database

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1458749A (en) * 2002-05-15 2003-11-26 深圳市中兴通讯股份有限公司 Safe quantum communication method
CN1959770A (en) * 2005-10-31 2007-05-09 富士通株式会社 Encryption method, decode method for cryptograph, encrypting machine, cryptograph decoder and communication system
CN101697512A (en) * 2009-11-09 2010-04-21 中国电子科技集团公司第三十研究所 Method and system for anti-interference quantum secure direct communication
CN106209363A (en) * 2016-08-26 2016-12-07 安徽问天量子科技股份有限公司 Quantum key distribution system based on quantum true random number and method

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10019235B2 (en) * 2011-09-30 2018-07-10 Los Alamos National Security, Llc Quantum random number generators
US9948459B2 (en) * 2014-07-25 2018-04-17 Cheng-Han KO Multiple encrypting method and system for encrypting a file and/or a protocol

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1458749A (en) * 2002-05-15 2003-11-26 深圳市中兴通讯股份有限公司 Safe quantum communication method
CN1959770A (en) * 2005-10-31 2007-05-09 富士通株式会社 Encryption method, decode method for cryptograph, encrypting machine, cryptograph decoder and communication system
CN101697512A (en) * 2009-11-09 2010-04-21 中国电子科技集团公司第三十研究所 Method and system for anti-interference quantum secure direct communication
CN106209363A (en) * 2016-08-26 2016-12-07 安徽问天量子科技股份有限公司 Quantum key distribution system based on quantum true random number and method

Also Published As

Publication number Publication date
CN106612176A (en) 2017-05-03

Similar Documents

Publication Publication Date Title
CN106612176B (en) One kind being based on quantum true random number arranging key negotiating system and machinery of consultation
EP0998799B1 (en) Security method and system for transmissions in telecommunication networks
CN108768930A (en) A kind of encrypted transmission method of data
CN102111273B (en) Pre-sharing-based secure data transmission method for electric load management system
CN108650227A (en) Handshake method based on datagram secure transfer protocol and system
CN104660602A (en) Quantum key transmission control method and system
JPH02288746A (en) Safety key generator and safety session key generating method in code system
CN111756529B (en) Quantum session key distribution method and system
WO2023082599A1 (en) Blockchain network security communication method based on quantum key
CN105119894B (en) Communication system and communication means based on hardware security module
CN113037499B (en) Block chain encryption communication method and system
CN110519050A (en) Cryptographic key negotiation method based on the exchange of quantum true random number with black box mapping
JP2020530726A (en) NFC tag authentication to remote servers with applications that protect supply chain asset management
CN111756528B (en) Quantum session key distribution method, device and communication architecture
CN108599926A (en) A kind of HTTP-Digest modified AKA identity authorization systems and method based on pool of symmetric keys
CN109951276A (en) Embedded device remote identity authentication method based on TPM
CN110620660A (en) Key distribution method for data communication based on block chain
CN108650096A (en) A kind of industrial field bus control system
CN108718237A (en) A kind of modified AKA identity authorization systems and method based on pool of symmetric keys
CN111490874B (en) Distribution network safety protection method, system, device and storage medium
CN110149205B (en) Method for protecting Internet of things terminal by using block chain
CN114826593B (en) Quantum security data transmission method and digital certificate authentication system
CN112787990B (en) Power terminal trusted access authentication method and system
CN111200817A (en) Method for automatically negotiating key between wireless devices
US7327845B1 (en) Transmission of encrypted messages between a transmitter and a receiver utilizing a one-time cryptographic pad

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant